• MSP Partners
  • Consultancy
    • Cyber Security
    • Cloud Security
    • Data Protection
    • DevOps
    • Secure Design
    • UK Government (HMG)
  • Certification
    • ISO 27001
    • Cyber Essentials
    • Cyber Essentials Plus
    • IASME Governance
  • Services
    • CS 360 Managed Service
    • Vulnerability Scanning
    • Penetration Testing
    • Security Awareness
    • Supplier Assurance
  • About
    • About us
    • Work with us
    • Our Blog
  • Contact us
  • Linkedin
  • Twitter
Cyber Security Specialists
  • MSP Partners
  • Consultancy
    • Cyber Security
    • Cloud Security
    • Data Protection
    • DevOps
    • Secure Design
    • UK Government (HMG)
  • Certification
    • ISO 27001
    • Cyber Essentials
    • Cyber Essentials Plus
    • IASME Governance
  • Services
    • CS 360 Managed Service
    • Vulnerability Scanning
    • Penetration Testing
    • Security Awareness
    • Supplier Assurance
  • About
    • About us
    • Work with us
    • Our Blog
  • Contact us
Menu

Blogs

The importance of a Work Life Balance

Ever feel like you end up working from the minute you get up till early evening? Feel like you don’t switch off from work? Constantly checking Teams, Slack or emails because it’s on your phone? Then you need to read…Read more

Cyber Essentials – What’s changing in 2022

The Government approved Cyber Essentials scheme includes five technical controls that help protect organisations from many forms of cyber-attacks. The scheme was introduced by the UK Government in 2014 as a way to help make the UK the safest place…Read more

The increasing importance of Supplier Assurance

Supplier assurance has long been a component of a company’s procurement process. You need to know that you can rely on a supplier, that they are dependable and financially sound. The procurement team will assess financial risk, insurance, standards, supply…Read more

Why do I need a WAF to protect my Web App?

With the rise of web threats, any internet based Web Application needs to have a proper firewall in place to protect it from cyber-attacks.  The most appropriate type of firewall in most cases is a Web Application Firewall, often referred…Read more

Threat Modelling with MITRE ATT&CK®

First of all – why is threat modelling important when implementing programs of change? Whether it be a Web Application or Hosting infrastructure project, to identify issues as early in the lifecycle as possible is massively important.  Threat modelling is…Read more

Why is Penetration Testing so important?

Regular penetration testing forms an essential part of a positive Cyber Security strategy and helps to identify and eliminate gaps in your organisation’s defences by attempting to breach some or all of the target system’s security, using the same tools…Read more

Amazon Alexa Security Considerations

What is Amazon Alexa? Cue – Wikipedia definition!  Amazon Alexa, also known simply as Alexa, is a virtual assistant AI technology developed by Amazon, first used in the Amazon Echo smart speakers developed by Amazon Lab126. It is capable of…Read more

What is Cyber Essentials?

Cyber Essentials is a government backed scheme and is an important part of the NCSC’s mission to “make the UK one of the safest places to live and do business on-line.”  It is designed to be a first step to…Read more

Next Page »

Our accreditations & Certifications

Consultancy

  • Cyber Security
  • Cloud Security
  • Data Protection
  • DevOps
  • Secure Design
  • UK Government (HMG)

Certification

  • ISO 27001
  • Cyber Essentials
  • Cyber Essentials Plus
  • IASME Governance

Services

  • CS 360 Managed Service
  • Vulnerability Scanning
  • Penetration Testing
  • Security Awareness
  • Supplier Assurance

Contact

Grove House
774-780 Wilmslow Rd
Manchester
M20 2DR

info@cybersecurityspecialists.co.uk
0161 706 0244

  • Linkedin
  • Twitter
© 2022 Cyber Security Specialists
  • Privacy Policy
Web Design by Carbon Creative